Which of the following types of network design elements would MOST likely be used?
An administrator needs to segment internal traffic between layer 2 devices within the LAN. Which
of the following types of network design elements would MOST likely be used?
Which of the following is designed to keep the HR department users from accessing the accounting department’
Pete, a security administrator, is informed that people from the HR department should not have
access to the accounting department’s server, and the accounting department should not have
access to the HR department’s server. The network is separated by switches. Which of the
following is designed to keep the HR department users from accessing the accounting
department’s server and vice-versa?
Which of the following would be the simplest way to accomplish this?
According to company policy an administrator must logically keep the Human Resources
department separated from the Accounting department. Which of the following would be the
simplest way to accomplish this?
which of the following can be inferred about the above environment?
Review the following diagram depicting communication between PC1 and PC2 on each side of a
router. Analyze the network traffic logs which show communication between the two computers as
captured by the computer with IP 10.2.2.10.
DIAGRAM
PC1 PC2
[192.168.1.30]——–[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]———[10.2.2.10] LOGS
10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN
10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK
10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK
Given the above information, which of the following can be inferred about the above environment?
The MOST effective way to mask the network address of the users would be by passing the traffic through a:
An administrator wishes to hide the network addresses of an internal network when connecting to
the Internet. The MOST effective way to mask the network address of the users would be by
passing the traffic through a:
Which of the following protocols was used to access the server remotely?
A security analyst is reviewing firewall logs while investigating a compromised web server. The
following ports appear in the log:
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?
Which of the following is a programming interface that allows a remote computer to run programs on a local mac
Which of the following is a programming interface that allows a remote computer to run programs
on a local machine?
Which of the following would Pete, a security administrator, MOST likely implement…
Which of the following would Pete, a security administrator, MOST likely implement in order to
allow employees to have secure remote access to certain internal network services such as file
servers?
Which of the following should be performed to increase the availability of IP telephony by prioritizing traffi
Which of the following should be performed to increase the availability of IP telephony by
prioritizing traffic?
Which of the following is MOST likely causing this issue?
An auditor is given access to a conference room to conduct an analysis. When they connect their
laptop’s Ethernet cable into the wall jack, they are not able to get a connection to the Internet but
have a link light. Which of the following is MOST likely causing this issue?